you can pack 300 or 800 mb files in zip and then craft a optimized command to extract and runmy file is over 300mb, do u keep ur exe small? im trying to put just a lnk in a zip file and have it download with no warnings
you can pack 300 or 800 mb files in zip and then craft a optimized command to extract and runmy file is over 300mb, do u keep ur exe small? im trying to put just a lnk in a zip file and have it download with no warnings
my file is over 300mb, do u keep ur exe small? im trying to put just a lnk in a zip file and have it download with no warnings



i thought its best to pack stub with 300mb to download fine over chrome
Whats that?
can u hit me up on telegram please lolyou can pack 300 or 800 mb files in zip and then craft a optimized command to extract and run,
yah maybe, PM mecan u hit me up on telegram please lol
is this a privet stuff can you share some info about this in PM or here )What a drama.
You can host your final payload anywhere,your own server or third-party services,specially legitimate ones,to host your final payload or the initial delivery(zip/iso) for example if you are not attaching to the email.
The guys above said almost everything already. In my case I use zipped password protected archive with DLL Search Order hijacking besides the .lnk and office macros. For those who don't know this technique,basically you use a legitimate vulnerable .exe file to load a malicious DLL on the same directory,or sideload. Choose a .exe with icon that helps with the social engineering in your campaign and that don't show any gui on the execution.
And about this taking too much steps to achieve execution,remember that is all about social engineering,people are dumb.
Video POC:
It took long to show the decoy because my connection was slow. You can see that the file is signed by microsoft and don't show any popups besides my custom decoy message box.
Well,you can find techniques like this online,there are so much info for free. But this specific method I'm using is 'private',and I don't know any TA using this exact .exe sideload in the wild.is this a privet stuff can you share some info about this in PM or here )
np i can understand, you using a legit exe signed by windows but DLLs are FUD ?Well,you can find techniques like this online,there are so much info for free. But this specific method I'm using is 'private',and I don't know any TA using this exact .exe sideload in the wild.
Sorry, I will not share more details(unless paying,off course).
Yeah, in this case the signed .exe is loading a signed legitimate .dll that will load the final payload. Of course the final payload must be FUD, or low detection already,OR you use a loader.np i can understand, you using a legit exe signed by windows but DLLs are FUD ?
My excel .xll isn't marcosWell, even Excel macros need the victims to enable them... at some point all those execution chains require that the victim is stupid enough and performs specific actions.
Yeah there is .xls marcos and .xll Both are Excel, I use .xllyah you are correct, and it is easy to convince people to enable macros XD , i just think it is lil bit hard to understand victims how to extract an run
Can I PM maybe we could work something togethernp i can understand, you using a legit exe signed by windows but DLLs are FUD ?
Yup PMs are always welcome))Can I PM maybe we could work something together
How do i purchase Quantum builder software??help reccommed me bossTry QuantumSoftware
threads/67100/How do i purchase Quantum builder software??help reccommed me boss
.ink are dead toobe creative with .ink, macros are dead
Checkzilla - AVs WITHOUT Internet connection (whole system is cutted off the Internet). Scans are inaccurate.Checkzilla scan is not enouph to know if its realy FUD or not , once you download the file it flaged it as malware that's mean the file is not FUD and detected at scantime , you need a FUD crypt to bypass this
That's true with checkzilla you can scan scantime and runtime if the encrypted stub has no stages to download and will 95% rightCheckzilla - AVs WITHOUT Internet connection (whole system is cutted off the Internet). Scans are inaccurate.